Proceedings of the 36th SIGCSE technical symposium on Computer science education
Incorporating security components into database courses
Proceedings of the 1st annual conference on Information security curriculum development
Teaching ethics and computer forensics: the Markkula center for applied ethics approach
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Risks of live digital forensic analysis
Communications of the ACM - Next-generation cyber forensics
Cryptographic hashing for virus localization
Proceedings of the 4th ACM workshop on Recurring malcode
Callgraph properties of executables
AI Communications - Network Analysis in Natural Sciences and Engineering
MAISim: mobile agent malware simulator
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
An immunological approach for file recovery over JXTA peer-to-peer framework
International Journal of Network Management
System configuration as a privilege
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
A survey on automated dynamic malware-analysis techniques and tools
ACM Computing Surveys (CSUR)
Statistical detection of malicious PE-Executables for fast offline analysis
CMS'10 Proceedings of the 11th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
Malware characteristics and threats on the internet ecosystem
Journal of Systems and Software
FC'12 Proceedings of the 16th international conference on Financial Cryptography and Data Security
A study on malicious codes pattern advanced analysis using visualization
Multimedia Tools and Applications
Hi-index | 0.00 |
Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to comeKeep control of your systems out of the hands of unknown attackersIgnoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it!This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly!Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home computer users, and anyone else interested in keeping their systems safe from attackers.